Business & Professional
Cyber Security 2 Days Virtual Live Training in Seoul
Course Overview Every organization is responsible for ensuring Cyber Security. The ability to protect its information systems from impairment or even theft is essential to success. Implementing effective security measures will not only offer liabili
- Seoul South Korea
- Start: Jul 19 2022 00:00
- Finish: Dec 01 2024 00:00
- Time zone: Asia/Seoul
- Dec 06 2019
- 44
- 1111 Views
Course Overview
Every organization is responsible for ensuring Cyber Security. The ability to protect its information systems from impairment or even theft is essential to success. Implementing effective security measures will not only offer liability protection; it will also increase efficiency and productivity.
With our Cyber Security workshop your participants will understand the different types of malware and security breaches. Develop effective prevention methods which will increase overall security. They will also understand the basic concepts associated with Cyber Security and what a company needs to stay secure.
Target Audience:
There is no Eligibility Criteria for this training, anyone can attend this training
Prerequisites:
There are no prerequisites for this course.
Course Materials:
Students will receive a course manual with presentation slides and reference materials.
Examination:
No Exam
Technical Requirements:
For eBooks:
Internet for downloading the eBook
Laptop, tablet, Smartphone, eReader (No Kindle)
Adobe DRM supported software (e.g. Digital Editions, Bluefire Reader)
eBook download and activation instructions
Agenda:
Module One: Getting Started
Icebreaker
Housekeeping Items
The Parking Lot
Workshop Objectives
Module Two: Cyber security Fundamentals
What is Cyberspace?
What is Cyber security?
Why is Cyber security Important?
What is a Hacker?
Case Study
Module Two: Review Questions
Module Three: Types of Malware
Worms
Viruses
Spyware
Trojans
Case Study
Module Three: Review Questions
Module Four: Cyber Security Breaches
Phishing
Identity Theft
Harassment
Cyberstalking
Case Study
Module Four: Review Questions
Module Five: Types of Cyber Attacks
Password Attacks
Denial of Service Attacks
Passive Attack
Penetration Testing
Case Study
Module Five: Review Questions
Module Six: Prevention Tips
Craft a Strong Password
Two-Step Verification
Download Attachments with Care
Question Legitimacy of Websites
Case Study
Module Six: Review Questions
Module Seven: Mobile Protection
No Credit Card Numbers
Place Lock on Phone
Don’t Save Passwords
No Personalized Contacts Listed
Case Study
Module Seven: Review Questions
Module Eight: Social Network Security
Don’t Reveal Location
Keep Birthdate Hidden
Have Private Profile
Don’t Link Accounts
Case Study
Module Eight: Review Questions
Module Nine: Prevention Software
Firewalls
Virtual Private Networks
Anti-Virus & Anti-Spyware
Routine Updates
Case Study
Module Nine: Review Questions
Module Ten: Critical Cyber Threats
Critical Cyber Threats
Cyber terrorism
Cyberwarfare
Cyberespionage
Case Study
Module Ten: Review Questions
Module Eleven: Defense Against Hackers
Cryptography
Digital Forensics
Intrusion Detection
Legal Recourse
Case Study
Module Eleven: Review Questions
Module Twelve: Wrapping Up
Words from the Wise
Review of Parking Lot
Lessons Learned
Completion of Action Plans and Evaluations